Tag Archives: enterprise security

Trend Micro TippingPoint® Named a Leader in 2017 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS)

Guest blog by Elisa Lippincott

Trend Micro TippingPoint has been named a Leader in the Gartner 2017 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS). With improvements in both Completeness of Vision and Ability to Execute from previous years, we believe that placement in the Leaders’ quadrant illustrates the positive progress we’ve made since the acquisition of TippingPoint in March 2016 from Hewlett Packard Enterprise.

What sets Trend Micro TippingPoint apart
Trend Micro TippingPoint Next-Generation Intrusion Prevention System (NGIPS) offers in-line comprehensive threat protection against advanced and evasive targeted attacks across data centers and distributed enterprise networks. It offers in-depth analysis of network traffic for comprehensive contextual awareness, visibility and agility necessary to keep pace with today’s dynamic threat landscape. Powered by security intelligence from TippingPoint Digital Vaccine® Labs (DVLabs) and the Zero Day Initiative vulnerability bounty program, the TippingPoint NGIPS provides accurate, preemptive threat prevention in real-time without affecting network performance. 

Earlier this year, we announced our first-to-market standalone NGIPS that delivers up to 100 Gbps inspection throughput with low latency. The TippingPoint 7600NX was designed for data centers and enterprise networks with high performance requirements who need a security solution that can easily scale to meet traffic demands.

With our Enterprise Vulnerability Remediation (eVR) capability, customers can pull in third-party vulnerability scanning data, map CVEs to TippingPoint Digital Vaccine® filters and take immediate action based on the enhanced threat intelligence to increase their security coverage. This powerful tool reduces administration time, increases security coverage, reduces unnecessary notifications, and provides a big picture view into an organization’s overall security posture.

ThreatLinQ is an easy-to-use, real-time threat intelligence console that allows customers to evaluate the changing threat landscape and make informed decisions to enhance their network security posture. Customers can access real-time threat intelligence, review Digital Vaccine filter details, and fine-tune their TippingPoint protection profiles.

We deliver Integrated Advanced Threat Prevention that provides enterprises:

Pre-emptive Threat Prevention: Inspect and block inbound, outbound and lateral network traffic in real-time to protect against known, unknown, and undisclosed vulnerabilities.

Threat Insight and Prioritization: Gain insight and context with complete visibility across the network to measure and drive vulnerability threat prioritization.

Real-Time Enforcement and Remediation: Defend the network from the edge to the data center to the cloud with real-time, inline enforcement and automated remediation of vulnerable systems. 

Operational Simplicity: Simplify security operations with flexible deployment options that are easy to setup and manage through a centralized management interface with recommended settings that provide immediate and ongoing threat protection.

Click here to learn more to find out why Gartner named Trend Micro TippingPoint a Leader in the 2017 IDPS Magic Quadrant.   

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


 

Why You Need Multi-layered Security for Maximum Endpoint Protection

by Bharat Mistry

Recent headlines have highlighted once again that many organisations are just a click away from a potentially catastrophic malware infection or data breach. The world-leading heart and lung Papworth Hospital in Cambridgeshire was lucky enough to have daily back-ups in place when it was recently hit by a ransomware attack. North Lincolnshire and Goole NHS Foundation Trust was less so, and ended up cancelling operations and moving patients elsewhere after IT systems were taken offline for several days.

Many endpoint security vendors trumpet their capabilities as a silver bullet to tackle these and other modern day threats. It’s a tempting prospect, but sadly with little substance to back up the claims. The truth is that the only way to effectively protect your organisation from the multiplicity of threats out there is with a multi-layered approach, which runs from traditional signature-based detection to advanced machine learning. Continue reading

Trend Micro Brings Out the Big Guns for Black Hat Europe

by Bharat Mistry

We have been successfully protecting consumers and organisations around the world for over 28 years now. And if anyone is wondering what the secret to sticking around for so long is, I’d have to say that our forward-looking threat researchers have played an absolutely vital role. Their hard work predicting where the next major threats will come from lays much of the groundwork for our industry leading product set and has helped differentiate the company as a reliable source of ground-breaking research.

But we can never stand still. And at Black Hat Europe in London next week some of our leading researchers will be showing off the fruits of their labour to similarly minded cybersecurity fanatics. Continue reading

The Truth Behind the Hype: Why Endpoint Security Needs to be Multi-Layered

by Ross Baker,

Today’s CISOs are assailed on all sides by a growing array of threats. From ransomware to targeted attacks, data-stealing malware to browser-based exploits – there’s no such thing as a ‘typical’ cyber attack any more. That’s why endpoint security tools need to cover a broad range of capabilities, to offer the maximum threat protection possible. But with so many vendors vying for competition, it’s no easy job picking through the distorted claims and marketing hype out there to find the right solutions.

Don’t believe the hype
If you were in any doubt about the scale of the threats facing UK organisations in 2016, just look at the latest results from interviews we conducted with over 300 UK IT decision makers. Seven in 10 (69%) said they thought their organisation will be targeted by ransomware in the next 12 months – a figure rising to three-quarters for those who’ve already experienced an attack.

And it’s not just ransomware that is keeping IT leaders awake at night. They’re also faced with the possibility of carefully targeted attacks designed to steal sensitive customer data or IP, zero day threats, exploit kits and other commodity malware. And then there’s the ever present risk of accidental data loss via insider negligence. It all adds up to a complex patchwork of threats which need an effective co-ordinated response based around multi-layered endpoint protection.

But there aren’t many vendors out there that can offer a truly comprehensive set of capabilities. Many trumpet ‘advanced’ or ‘next generation’ products, but dig a little deeper and you’ll find they’re little more than one-trick ponies. Machine learning is one such feature getting a lot of press at the moment. But while it’s good at threats hidden in executables, it doesn’t work so well on malware in non-executable files, like PDFs.

Some endpoint security vendors also fail to offer holistic security platforms. While the endpoint is undoubtedly under threat, so too is the web/email gateway, the network and servers. That’s why it’s important to find tools which integrate easily and if possible share threat intelligence to improve the organisation’s overall security posture. It’s also important to remember that blocking online attacks is not the be-all-and-end-all. Your endpoint security should also be equipped to respond and remediate, and learn from incidents so that the organisation is protected next time it encounters the same type of attack.

What you need
For the most effective endpoint security, look for vendors that offer multiple layers of protection to combat the broad range of threats out there. Trend Micro’s endpoint security suites feature anti-malware, ransomware protection, memory inspection, encryption, device control, data loss prevention (DLP), vulnerability shielding, command and control blocking, browser exploit prevention, app whitelisting, behaviour monitoring, web threat protection, and more.

The technology works across all stages of the threat lifecycle to offer connected defence: Prevent, Detect, Analyse, Respond. That means that intelligence generated from network or server security tools, for example, can be used to lock down the endpoint. It’s also manageable from a centralised console and has been built for speed, featuring a lightweight client which won’t impact performance.

Organisations today are faced with a sophisticated enemy used to using multiple varied tools and techniques to achieve its goal. The only way to combat this effectively is through layered endpoint protection.